Getting Comfortable With The Basics

Security

1 2 3 8

Everybody Should 2FA 

Everybody Should 2FA  – By Authy youtube.com  Video

Learn more about two-factor authentication and download the Authy app for IOS, Android and Chrome.


How to do two-factor authentication like a pro – By Sandra Gutierrez G 
You can hold the key to your online security. Like, literally.
If your level of anxiety over online security and privacy is on the healthy side, you probably already have two-factor authentication (2FA) set up for your main accounts. If you don't, you should seriously consider activating it to protect yourself from phishing, hacks, and anybody who may want to steal your data.

My Experience with a Charles Schwab Debit Card in Withdrawing Cash in Abroad 

My Experience with a Charles Schwab Debit Card in Withdrawing Cash in Abroad  — By Anya Kartashova10xtravel.com
International travel is often filled with the excitement of getting to know a new country, trying its food and learning about its traditions. However, it also comes with a plethora of headaches, such as how to communicate with locals without speaking their language, how to buy a SIM card to post all your Instagram photos and how to get cash without being ripped off.

Why You Need a Password Manager

Why You Need a Password Manager. Yes, You. – By thewirecutter.com
You probably know that it’s not a good idea to use “password” as a password, or your pet’s name, or your birthday. But the worst thing you can do with your passwords—and something that more than 50 percent of people are doing, according to a recent Virginia Tech study—is to reuse the same ones across multiple sites. If even one of those accounts is compromised in a data breach, it doesn’t matter how strong your password is—hackers can easily use it to get into your other accounts.


The Risk of Weak Online Banking Passwords  – By krebsonsecurity.com
If you bank online and choose weak or re-used passwords, there’s a decent chance your account could be pilfered by cyberthieves — even if your bank offers multi-factor authentication as part of its login process. This story is about how crooks increasingly are abusing third-party financial aggregation services like Mint, Plaid, Yodlee, YNAB and others to surveil and drain consumer accounts online.

ZenMate Review

ZenMate Review – By ZenMatethebestvpn.com8 min
The first visit to the ZenMate.com homepage shows off a professional, sleek, and minimalistic design.

According to their website, there are also over 41 million ZenMate users across the world who use the tool “to access the web securely, anonymously and without restriction.”

Best password managers: Reviews

Best password managers: Reviews of the top products – By Michael Ansaldopcworld.com5 min
We are terrible at passwords. We suck at creating them (the top two most popular remain “123456” and “password”), we share them way too freely, and we forget them all the time. Indeed, the very thing that can ensure our online security has become our biggest obstacle to it. This is what makes a good password manager essential.


The 5 Best Authenticator Apps to Generate 2FA Codes on Mac – By Rob Nightingalemakeuseof.com5 min
Want to secure your online accounts with two-factor authentication (2FA)? Then you’ll need an authenticator app to scan the relevant QR codes during the setup process. Such an app can also generate the TOTPs (Time-Based One-Time Passwords) that you need, in addition to your login passwords, to unlock your 2FA-enabled accounts.

Password overload making your head explode

Online password overload making your head explode? A cyberfraud expert has the answer – By Rob Carricktheglobeandmail.com3 min
Technology’s most epic fail of the past two decades is arguably that passwords are still being used for internet security.

Passwords were manageable 20 years ago, when we frequented a small number of websites at most and few or none of them involved money. Today, many of us have half our lives online. 

Instead of Changing Your Passwords, Upgrade Them

Instead of Changing Your Passwords, Upgrade Them – By David MurphyEmailTwitterPostslifehacker.com4 min
What makes for a great password? Something long, something randomized with all kinds of characters—numbers, symbols, and letters of all cases—and, ideally, something backed up by a secondary authentication method. In other words, the easier it is for you to remember your password, the easier it is for someone else to crack it (generally speaking).


7 Reasons You Should Be Using a Password Manager – By Dave Parrackmakeuseof.com5 min
You’ve heard about password managers like LastPass and Dashlane, but you’re not sure if you need one. Well, here’s the thing: you need one. If you have more than one account and are security-aware enough to maintain different passwords, you need a password manager.

What is Gmail Confidential mode?

What is Gmail Confidential mode? – By Marc Lagaceandroidcentral.com2 min
Best answer: Confidential Mode is a feature built into the Gmail mobile app that gives you better control over emails containing sensitive or personal information. You're able to set emails to expire after a set amount of time, require SMS passcode verification to open the message, or you can go in and revoke someone's access to an email.

Why You Should Use a Password Manager

Why You Should Use a Password Manager, and How to Get Started – By Chris Hoffmanhowtogeek.com6 min
The majority of people use very weak passwords and reuse them on different websites. How are you supposed to use strong, unique passwords on all the websites you use? The solution is a password manager.


LastPass: Password security for your family in 2018  – By  dottotech  youtube.com VIDEO

Improve your online security and save time with LastPass, the password manager that remembers all your passwords so you don't have to.

Suspicious Site Reporter extension for Chrome

Google releases Suspicious Site Reporter extension for Chrome – By Martin Brinkmannghacks.net
Suspicious Site Reporter is a new browser extension by Google for the company's Chrome web browser that provides users with options to report sites to the company.

The extension has two main functions: to report sites to Google and to highlight if Google found anything suspicious about the site.

Got a Chromebook? Here’s how and why you need to protect your Google account

Got a Chromebook? Here’s how and why you need to protect your Google account   – By Kevin C. Tofelaboutchromebooks.com4 min
With a simple Google account sign on, a Chromebook is quick to get you working, playing or whatever you want to do. But that Google account is the key to your Chromebook castle, and probably many other services as well, so you want to make sure it’s protected at all costs.

Use Token to protect yourself against credit card fraud

Use Token to protect yourself against credit card fraud – By Rick Broidacnet.com4 min
My son had his first debit card for all of three months before the number got stolen and used for unauthorized purchases — to the tune of about $1,600. It's happened to me at least three or four times. And based on a couple informal polls I ran, at least 75 percent of Cheapskate readers have experienced it at least once.

LastPass Password Manager Review

LastPass Password Manager Review— Worth Downloading? – By Gwynn Ballard securitybaron.com

We all heavily depend on password-protected sites and apps. Between social networking, work emails, personal emails, and online banking, using the same password for everything may seem convenient. But using one password across multiple accounts makes you much more vulnerable to hackers and security breaches. Luckily, there are password managers that allow you to store all of your unique passwords in one place.


The Five Best Password Managers – By Alan Henrylifehacker.com12 min

A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or keep them local only, change web passwords with a click, log in to sites for you, and more.

– Does Two-Factor Authentication Really Make You Safer?

Does Two-Factor Authentication Really Make You Safer? – By Max Eddy pcmag.com

This week, I'm digging back into my bottomless mailbag to tackle another question about two-factor authentication (2FA). It's a subject I've touched on before, but judging from the volume and specificity of the questions I've received about it, it's clearly an issue a lot of people are thinking about. Since I view 2FA as, perhaps, the single best thing regular people can do to stay safe online, I'm more than happy to talk endlessly about it.

Smart Lock is Android’s best-kept secret

Smart Lock is Android's best-kept secret – By Ara Wagoner, www.androidcentral.com

The original Moto X was a glorious phone for a lot of reasons, and I loved mine to (literal) death for its clean software, Moto Voice, and also for this awesome little feature called Trusted Bluetooth. Trusted Bluetooth kept your phone unlocked so long as it stayed in connected to a trusted device, and since my headphones lived around my neck, I hardly ever unlocked my phone.

What Is Gmail Confidential Mode?

What Is Gmail Confidential Mode? (And How to Use It) by Richard Priday  tomsguide.com

Since 2018, the time of Gmail’s last redesign, personal account users have been able to activate ‘Confidential Mode’, a series of options intended to make your emails more secure.

Credit: ShutterstockAmong these options are making the email delete itself after a set period of time, limiting the recipient’s ability to copy, forward, print or download the contents, instantly revoking access or setting up an SMS verification lock, which sends the recipient a code they have to enter before reading what you’ve sent to them.

Best Account Security Methods

Here Are the Best Account Security Methods, According to Google – By David Murphy, Email, Twitter, Posts, lifehacker.com

Everywhere you turn, someone is handing out advice about account security and privacy. And while it never hurts to be reminded about all the ways you can protect your critical data, have you topped to wonder whether any of the various security measures you’re taking are actually effective?


WebAuthn Web Authentication with YubiKey 5  – By Todd A. Jacobs, www.linuxjournal.com

A look at the recently released YubiKey 5 hardware authenticator series and how web authentication with the new WebAuthn API leverages devices like the YubiKey for painless website registration and strong user authentication.


Google data shows 2-factor authentication blocks 100% of automated bot hacks – By Napier Lopez, thenextweb.com

Two-factor authentication is annoying. Getting flustered because you have to find your phone and tap on a prompt every time you log into your accounts from a new device is peak first-world problems. But if you ever had any doubt whether it really made you that much safer, Google has the data to dispel that uncertainty.

 

Wyze Sense review

Wyze Sense review: This $20 sensor system is a steal for security DIYers​ – By Michael Ansaldo, www.techhive.com

Wyze Labs turned our conception of home security cameras on its ear with the Wyze Cam and Wyze Cam Pan. These two convention-defying cameras pack premium features like Full HD video, motion detection and tracking, and smart home integration into easy-to-install devices for just $20 and $30, respectively. Now they’ve done much the same by introducing a $20 home sensor system.

– Never Lose Access to LastPass with Account Recovery on Mobile

Never Lose Access to LastPass with Account Recovery on Mobile  – By Amber Steel, blog.lastpass.com

LastPass takes away the burden of remembering passwords – and getting locked out of your accounts. But what if you forget your LastPass master password? It’s the one password you still need to remember. Because of our zero-knowledge security model, LastPass never knows your master password and therefore can’t reset it for you. So, what do you do if you’ve forgotten it? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up – By Eric Griffith, www.pcmag.com

In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.


5 best two-factor authenticator apps for Android – By Contact, www.androidauthority.com

Two-factor authentication is a popular and powerful security tool. It requires you to verify that you actually logged into whatever account you logged into. This adds a personal touch. In order to hack your account, someone would need more than just your password and username. Of course, it’s not an end all, be all solution. However, it is nice having an extra layer of security. There are a few decent apps for this, although most sites use your phone number for text messaging. Those who want to use authenticator apps have only a few good choices. Here are the best ones for Android!

 


How to use your Android phone as a two-factor authentication security key – By Shannon Liao, www.theverge.com

Google added a new way to verify your logins this week: using your Android phone as a physical security key for two-factor authentication. You should be using two-factor authentication to log onto websites, so that even if someone has your password from a data breach, they won’t be able to get in. And now with the new feature, if you have an Android phone running 7 or higher, you also have a convenient security key.

How to Not Get Locked Out With Two-Factor Authentication

SecurityWatch: How to Not Get Locked Out With Two-Factor Authentication – By Max Eddy, www.pcmag.com

Security tools often create a certain amount of anxiety. What happens if I lose my password? Or if my antivirus deletes my stuff? The advent of two-factor authentication has created a new twist on a familiar anxiety: what happens if I can't use my second factor and get locked out of my account?


Two-factor authentication explained: How to choose the right level of security for every account – By Michael Simon, www.pcworld.com

If you aren’t already protecting your most personal accounts with two-factor or two-step authentication, you should be. An extra line of defense that’s tougher than the strongest password, 2FA is extremely important to blocking hacks and attacks on your personal data. If you don’t quite understand what it is, we’ve broken it all down for you.

Your Android phone can now be a security key for your Google account

Your Android phone can now be a security key for your Google account – By Alex Wagner, www.phonedog.com

Two-factor authentication helps to secure your online accounts by adding a second step to the login process. Today Google is making it easier for Android users to add 2FA to their account.


Android 7.0+ Phones Can Now Double as Google Security Keys – by krebsonsecurity.com

Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google’s various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft.

The Best Password Managers

The Best Password Managers by thewirecutter.com

If you’re not using a password manager, start now. A password manager makes you less vulnerable online by generating strong random passwords, syncing them securely across your browsers and devices, and filling them in automatically. After 18 hours of research and testing, we believe that LastPass is the best password manager for most people. It has all the essential features, it works with virtually any browser on any device, and most of its features are free. (A Premium version, which costs $24 per year, adds advanced security features, better sharing, and other useful tools.


I Finally Set Up a Password Manager—and You Really Should, Too By Lauren Phillips, www.realsimple.com

Anyone who doesn’t already have a password manager needs one—stat. Talking about online security might not be the most glamorous topic, but with the huge number of password-requiring accounts and sites online, it’s quickly becoming one of the most important ones, especially because an ill-intentioned person with the right password can wreak havoc across one’s finances, social media accounts, and more.


Protecting Your Internet Accounts Keeps Getting Easier. Here’s How to Do It. By Brian X. Chen, www.nytimes.com

There are many tools for setting up two-factor authentication, a security mechanism that prevents improper access. These four methods are the most compelling.


Why you should never allow your web browser to save your passwords By Jack Wallen, www.techrepublic.com

When a web browser like Chrome, Firefox or Safari is allowed to store passwords, you're putting your network security at risk.

Privacy.com Review

Privacy.com Review By Ash The Great, echeck.org

When you pay for something online, you are putting your financial and personal details at risk. No matter which form of payment you use, there is always a risk, and there is no way for you (the consumer) to know just how big or small the risk is. The sheer number of massive hacks and leaks over the last ten years is proof enough that we have no idea how safe our payment information really is. Privacy.com adds another layer of privacy. Every time you use your credit card, it generates a brand new set of details, and you use the new details to pay instead of your real payment details. It is like paying with a disposable credit card. Privacy.com allows you to generate new payment details that you can use to buy things online, and they call it, “Creating a virtual credit card.”

Google Smart Lock: Guide

Google Smart Lock: The complete guide By Jr Raphael, www.computerworld.com

Think fast: How many times a day do you pick up your phone to look at something? Unless you live in the tundra or have far more self-control than most, the answer probably falls somewhere between "quite a few" and "more than any sane person could count." Assuming you keep your device properly secured, that means you're doing an awful lot of unlocking — be it with your face, your fingerprint, or the code you tap or swipe onto your screen.

10 Important Android Settings You Should Know

10 Important Android Settings You Should Know! By Thiojoe, youtube.com   VIDEO

Android is an extremely popular mobile OS, and I actually think most of you use it. So here are some important settings that you should know about if you don't already. They aren't hidden settings, so don't be surprised if you do know some. They aren't settings you should necessarily change, because most of these come down to preference.

– Android Settings You Should Change Now!

13 Android Settings You Should Change Now! by ThioJoe youtube.com   VIDEO

Those default settings are no good! Here's what to change…  —  Android has a lot of default settings that might be OK for most people, but there are some that really everyone should change. These might be settings related to privacy, security, or just plain convenience.

Firefox Send, Free File Transfers

Firefox SendFree File Transfers and Sharing with End to End Encryption.

Firefox Send uses end-to-end encryption to keep your files secure from the moment you share to the moment it's opened. You choose when your file link expires, the number of downloads and the option to add a password to protect the contents further.  

Firefox Send also makes it easy to share large file sizes. You can share file sizes up to 1GB without a login. To send files up to 2.5GB, login to your Firefox account, if you don't have a Firefox account signup is free.

Firefox Send makes it easy for your recipient. They click the link you sent to download the file. They don’t need to have a Firefox account to download your file. Making the file sharing experience seamless for both parties, as quick as sending an email.

Here's the link to Firefox Send, save as a bookmark.

Note: This is a great tool for sharing event pictures and videos with other attendees. Simply upload your images, send everyone the link, as many as 100 people will have 7 days to download them.

1 2 3 8
Tech News by Topic